CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition product of Oracle Java SE (component: Hotspot).
Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf,
11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3,
22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and 21.3.10. Difficult
to exploit vulnerability allows unauthenticated attacker with network
access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM
for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this
vulnerability can result in unauthorized creation, deletion or
modification access to critical data or all Oracle Java SE, Oracle GraalVM
for JDK, Oracle GraalVM Enterprise Edition accessible data as well as
unauthorized access to critical data or complete access to all Oracle Java
SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible
data. Note: This vulnerability can be exploited by using APIs in the
specified Component, e.g., through a web service which supplies data to the
APIs. This vulnerability also applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java
applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score
7.4 (Confidentiality and Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | openjdk-17 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-17 | < 17.0.12+7-1ubuntu2~20.04 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-17 | < 17.0.12+7-1ubuntu2~22.04 | UNKNOWN |
ubuntu | 24.04 | noarch | openjdk-17 | < 17.0.12+7-1ubuntu2~24.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-21 | < 21.0.4+7-1ubuntu2~20.04 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-21 | < 21.0.4+7-1ubuntu2~22.04 | UNKNOWN |
ubuntu | 24.04 | noarch | openjdk-21 | < 21.0.4+7-1ubuntu2~24.04 | UNKNOWN |
ubuntu | 18.04 | noarch | openjdk-8 | < 8u422-b05-1~18.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-8 | < 8u422-b05-1~20.04 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-8 | < 8u422-b05-1~22.04 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2024-21147
nvd.nist.gov/vuln/detail/CVE-2024-21147
security-tracker.debian.org/tracker/CVE-2024-21147
security.netapp.com/advisory/ntap-20240719-0008/
ubuntu.com/security/notices/USN-6929-1
ubuntu.com/security/notices/USN-6930-1
ubuntu.com/security/notices/USN-6931-1
ubuntu.com/security/notices/USN-6932-1
www.cve.org/CVERecord?id=CVE-2024-21147
www.oracle.com/security-alerts/cpujul2024.html